Cypherpunk Anonymous Remailer
   HOME

TheInfoList



OR:

A Cypherpunk
anonymous remailer An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anony ...
, also known as a Type I remailer, is a type of
anonymous remailer An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anony ...
that receives messages encrypted with PGP or GPG, follows predetermined instructions to strip any identifying information, and forwards the messages to the desired recipient. Cypherpunk anonymous remailers are vulnerable to traffic analysis attacks, which take advantage of the predictable order in which messages are sent to recipients. This predictability can potentially reveal the identity of the sender. To address this weakness, Type II and Type III remailers were developed. Prior to the introduction of Mixmaster (Type II) remailers, users attempted to mitigate this issue by sending messages in batches or by using multiple remailers in sequence to further obscure the sender's identity. Mixmaster remailers were built upon the technology of Cypherpunk remailers, rendering the latter
obsolescent Obsolescence is the process of becoming antiquated, out of date, old-fashioned, no longer in general use, or no longer useful, or the condition of being in such a state. When used in a biological sense, it means imperfect or rudimentary when comp ...
. However, there are still websites and systems which rely on the general ideas of layered encryption and identity obfuscation behind Type I remailers.


History

The
Cypherpunk A cypherpunk is one who advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement originated in the late 1980s and gained traction with th ...
movement emerged in the late 1980s and early 1990s, consisting of activists, cryptographers, and computer scientists who believed in the use of
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
as a means to safeguard
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
and resist government interference. They played a crucial role in the development of privacy technologies, including remailers.


Uses

While they are mostly considered obsolete due to the Mixmaster being the most common remailer type, Cypherpunk remailers are still applicable in niche applications for those who have no other accessible options. For example, sites that are censored or blocked by
government A government is the system or group of people governing an organized community, generally a State (polity), state. In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
s can use such remailers to circumvent this censorship. Cypherpunk remailers also require less setup and fewer resources to run, and can therefore be a suitable solution for those under time constraints or with few available assets.


See also

*
Anonymity Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
*
Anonymous P2P An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routin ...
*
Anonymous remailer An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anony ...
*
Mixmaster anonymous remailer Mixmaster is a Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. It is an implementation of a David Chaum's mix network. ...
(Type II) *
Mixminion Mixminion is the standard implementation of the Type III anonymous remailer protocol. Mixminion can send and receive anonymous e-mail. Mixminion uses a mix network architecture to provide strong anonymity, and prevent eavesdroppers and other atta ...
(Type III) *
Onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
*
Tor (network) Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traf ...
*
Pseudonymous remailer A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailer ...
(aka. nim servers) * Pen net remailer *
Data privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data ...
*
Traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...


Notes

* The additional headers used in this context are referred to as "pseudo-headers" because they are not included in the RFC 822 headers specification for email. * Messages sent to Cypherpunk remailers can be layered, meaning they pass through multiple Cypherpunk remailers to minimize the chances of identifying the sender. * Some Cypherpunk remailers also function as
Mixmaster anonymous remailer Mixmaster is a Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. It is an implementation of a David Chaum's mix network. ...
s, enabling them to divide long Cypherpunk messages into Mixmaster packets and forward them to the next remailer if it supports Mixmaster functionality. * Many users of Cypherpunk remailers may choose to repeat steps 1–4 to add additional layers of protection to their messages, routing them through multiple remailers for enhanced privacy and security.


Further reading

* ''Email Security'',
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
() * ''Computer Privacy Handbook'', Andre Bacardi ()


External links


About.com: Send Email Anonymously – Chaining Remailers with PGPFeraga.com: How to use a Type I Anonymous Remailer
(link not active 12 May 2010, se
archive version


References

{{Authority control Internet Protocol based network software Anonymity networks Routing Network architecture